Abstract

Outsourcing the user's sensitive data on to honest-but-curious cloud storage servers pose several data security and access control challenges. Single key and multi-key encryption strategies to protect the data require data owner participation for providing access to data and management of multiple keys by users. To reduce the key management at the users and to remove data owner's participation during data accesses, we propose three access control schemes: 1) based on the principle of polynomial interpolation; 2) using multilinear map; 3) dynamic access control scheme using multilinear map. The security of multilinear map based schemes relies on the multilinear Diffie-Hellman assumption. The key generated for data encryption is regulated by the access authorisations holding on the data. In all the proposed schemes, the authorised user needs to store only one key irrespective of the number of data items to which the user has authorised access and do not require the data owner's participation except in grant and revoke operations.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.